- UpvoteDownvoteShare Job
- Suggest Revision
Ensures compliance of departmental policies and procedures as established within the department, including, but not limited to, change control management policies, network security policies, systems maintenance procedural policies, disaster recovery and business continuity procedural policies and system documentation policies.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security tools: Microsoft 365 E5 Suite, Tenable/Nessus vulnerability management, a SIEM, Logmonitor. Ensuring the stability, availability, performance and security of theenterprise network; including, but not limited to, internal/external network security, vulnerability scanning, patching and remediation, software/firmware updates, server class operating systems, managing cloud services and other duties as assigned.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The position of Network Security Engineer involves tasks associated with the installation, movement and maintenance of computers, routers, switches, cables, and containers of such equipment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide critical incident response & problem management including root cause of system problems, such as configuration issues resulting in operational performance degradation or system outages, supporting the government with information and advice on the necessary correction actions and/or interim workarounds relative to network security.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of related Network Security Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with one or more of these tools: - SecureSphere Imperva Web Application Firewalls (WAF), Database Activity Monitoring (DAM) - RSA Security Analytics (NetWitness) - Symantec Bluecoat - Cisco FirePower (SourceFire) - Splunk.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Extensive knowledge of industry standard network and security technologies (Firewalls, IDS/IPS, VPNs, Packet Capture, network assessments, router/switch rack and stack and cabling, network configurations and etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Operate and maintain CLS Security controls related to SIEM, DLP, Vulnerability Management, Cyber Threat Intelligence, Endpoint Protection, Network Protection, etc. Design and integrate consistent security solutions across CLS on-premise and cloud environments for domains like Vulnerability Management, Endpoint Security, Data Security, Network Security, Identity and Access management, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Keywords:Chicago IL Jobs, Network Security Engineer III, Cybersecurity, Network Engineering, Information Security, Cisco, Switches, TCP/IP, MPLS, BGP, VoIP, DHCP, DNS, Wifi, VLANs, Networking, Chicago Recruiters, Information Technology Jobs, IT Jobs, Chicago Recruiting.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SME-level knowledge of network security best practices and devices, augmented by relevant security certifications (e.g., CompTIA Security+, CISSP) to enhance the network's defense mechanisms.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
2+ years' experience with configuration and operation of Mobile Device Management systems (JAMF School/Pro, Meraki Systems Manager, Mosyle) Familiarity and experience with switches, firewalls, access points by Cisco, Meraki, Sonicwall, HP, Ruckus, Aruba, Ubiquiti; UPSs by APC; VoIP by Zoom; security cameras by Verkada; projector mounting and configuration; switch cabling and cable troubleshooting; mass deployment of end user devices.
$95,000 - $120,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports. Working knowledge of Risk Management Framework, Common Criteria, and System Security Policy as they relate to assessments and authorization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
KEYWORDS: RMF, Risk Management Framework, ICD, Information Assurance, IA, IAO, IAT, IAM, A&A, A+, Network+, Security+, Non-classified Internet Protocol Router Network (NIPRNet), Secret Internet Protocol Router Network (SIPRNet), DISA Security Technical Implementation Guides (STIGs), CISSP, CASP.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience working with cyber security; CISSP, CCSP, CSA or certifications •Experience working with Netskope, Forcepoint, and/or other web proxy products •Collaborating with other engineering and IT teams to plan, develop, execute and support infrastructure and network-related projects; offer thought leadership in regard to network security and management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process.
Full-timeExpandApply NowActive JobUpdated 26 days ago
network security product management jobs Title: network consultant
FEATURED BLOG POSTS
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.